Reverse Engineering WhatsApp: Encryption for Chat Manipulation and More at Black Hat USA

The industry is preparing for the biggest annual event, Black Hat USA 2019, in Las Vegas, Aug. 3-8. Black Hat USA returns to Las Vegas for its 22nd year, at Mandalay Bay Resort and Casino. Beginning with four days of training (August 3 – 6) students can choose from 70+ hands-on courses for hackers. We are excited to meet with more than 19,000 security professionals who are expected to attend the main conference starting on August 7 – 8, in booth 1516. Our goal and vision is to prevent unknown and known attacks, and to consolidate security for your device, endpoints, cloud and network using the world’s leading security research, incident response tactics and Check Point Infinity architecture.

Check Point’s Research Head of Products Vulnerability Research, Oded Vanunu and Security Researcher, Roman Zaikin are scheduled to present at Black Hat. They will dive into how they manage to reverse engineer WhatsApp web source code and successfully decrypt WhatsApp traffic. During the process, they translated the WhatsApp web functions to python to investigate traffic to unveil vulnerabilities via Chat on WhatsApp. They will reveal the possible methods of attack concerning all of the vulnerabilities and show what threat actors can do. Don’t miss this briefing – Reverse Engineering WhatsApp: Encryption for Chat Manipulation and More.

It’s safe to assume that many people reading this text have heard of using the remote desktop protocol (RDP) to connect to other machines. But has anyone every considered that merely RDP cam compromise this own computer? Learn how just be connecting to a rogue machine, your own host can

Join Dana Baril Security Software Engineer, Microsoft and Eyal Itkin, Vulnerability Research at Check Point for their non-sponsored session. In this collaborative talk, our researcher and Microsoft’s researcher share the inside story of the attack from both the offensive and defensive perspectives.

Check Point is featuring back-to-back lightning presentations in the Business Hall to help you overcome your cyber security challenges and to deliver threat prevention with proactive cloud security, absolute zero trust for your network, endpoints and blocking mobile cyber attacks before they strike. To take advantage of these offerings, attend the following sessions:

Unified security across networks, cloud and mobile from a single pane of glass

Charity made easy. “I am a giver Not a Taker”

This year, we are asking you to pick the charity, one of three, and we will donate for you at the booth. In place of booth swag, Check Point is giving you the chance to go support a favorite charity offered at the booth and with a scan of your badge, we will donate for you. We are raffling off a Bluetooth JBL speaker at each lightning presentation.

Hacking Point Challenge and Cyber Range will be located in booth 1516.Register online now. Get in the game by registering online for our Cyber Range virtual hacking challenge. Pick your team – Red team or Blue team – and play for the highest score. Before Black Hat, log on and register to sharpen your hacking skills. See your score in our booth at 1516 to win prizes at Black Hat. Gain certification via Hacking Point. Choose either the Red or the Blue challenge.

Check Point Threat Survey team wants to hear from you. Chat with our experts to share your threat experiences and challenges in across your organization that could benefit from the Check Point Absolute Zero Trust security. Enter to win an Apple Watch.

Let’s Party!

Join the conversation in real time, online, by following Check Point on Twitter @CheckpointSW, for the latest updates live from the show floor. Also, find us on LinkedIn, Facebook and Instagram and use the hashtag #BHUSA.